In Bluetooth Pairing Part 1: Pairing Feature Exchange, we talked about the pairing feature exchange in Bluetooth® with low energy. The pairing feature exchange is used to make both devices, initiator and responder, understand each other’s pairing features.

The pairing features that can be enabled are:

  • OOB Data Flag bit
  • MITM—Man-In-The-Middle bit
  • SC—LE secure connection indicator bit
  • IO Cap—IO Capabilities

*For an introduction to these features, please refer to Bluetooth Pairing Part 1: Pairing Feature Exchange.

After this exchange, both devices can select which key generation method is used in subsequent phases. Here is the list of key generation methods for Bluetooth LE legacy pairing and Bluetooth LE Secure Connection.

Bluetooth LE Legacy Pairing:

  • Just Works
  • Passkey
  • Out-of-Band(OOB)

Bluetooth LE Secure Connection includes the three methods above and adds one new one:

  • Numeric Comparison

Workflow

Here is the workflow on how a device decides which key generation method to use.

Step 1: Check SC bit in pairing feature exchange frame. If the SC bit is equal to 1 on both sides, an LE secure connection is used, go to step 2. Otherwise, it is LE legacy pairing, and go to step 3.

Step 2: When it is LE secure connection, below is the matrix that initiator and responder will follow.

  • “Use OOB” means Out-of-Band is selected.
  • “Check MITM” means ignore “OOB Data Flag” and check MITM flag, “Man-In-The-Middle” flag.
  • “Use IO Capabilities,” go to step 4 to select the key generation method depending on IO Capabilities of both devices.

Step 3: When it is LE legacy pairing, below is the matrix that initiator and responder will follow.

  • “Use OOB” means Out-of-Band is selected.
  • “Check MITM” means ignore “OOB Data Flag” and check the MITM flag, “Man-In-The-Middle” flag.
  • “Use IO Capabilities”, go to step 4 to select the key generation method depending on IO Capabilities of both device.

Step 4: Below is a mapping of the IO Capabilities to Key Generation Method. With this table, both devices, initiator and responder, will find an appropriate method for connecting depending on their pairing features.

After this, the initiator and responder understand the method that will be used in the key generation phase. In part 3, I will introduce how to generate the corresponding key in Bluetooth® LE legacy pairing by using the Passkey method.

FEATURED DOWNLOAD

Bluetooth 5: Go Faster, Go Further

Download this comprehensive overview to discover how Bluetooth 5 significantly increases the range, speed, and broadcast messaging capacity of Bluetooth applications, making use cases in smart home automation, enterprise, and industrial markets a reality.

INSTANT DOWNLOAD

Six Bluetooth® Mesh Feature Enhancements to Get Excited About

Since the introduction of Bluetooth® mesh five years ago, Internet of Things (IoT) device…

Bluetooth® Mesh Feature Enhancements Summary

This paper summarizes each area of change and provides references to other papers which…

Bluetooth® Mesh Subnet Bridging - Technical Overview

Subnet bridging was introduced in version 1.1 of the Bluetooth® Mesh protocol specification. This…

Bluetooth® Mesh Remote Provisioning - Technical Overview

The remote provisioning feature was introduced in version 1.1 of the Bluetooth® Mesh protocol…

Bluetooth® Mesh Private Beacons - Technical Overview

Private Beacons are a type of beacon that was introduced in Bluetooth® Mesh version…

Bluetooth® Mesh Directed Forwarding - Technical Overview

Directed forwarding was introduced in version 1.1 of the Bluetooth® Mesh protocol specification. To…

Bluetooth® Mesh Device Firmware Update - Technical Overview

Bluetooth® Mesh 1.1 introduced a new set of capabilities which allow the firmware running…

Bluetooth® Mesh Certificate Based Provisioning - Technical Overview

Certificate-based provisioning was introduced in version 1.1 of the Bluetooth® Mesh protocol specification. To…

The Latest in HADM with Bluetooth LE

HADM, or high accuracy distance measurement using Bluetooth does exactly what it says –…

Silicon Labs Bluetooth Low Energy Devices Now Support Bluetooth Core Specification 5.4

The release of Bluetooth® Core Specification Version 5.4 earlier this year was met with…

Mr. Beacon Podcast: Snapdragon Sound with Mike Canevaro

This episode of the Mr. Beacon Podcast explores the revolutionary world of Bluetooth audio.…

The Importance of Commissioning in NLC

With constant technology advancements and growing market awareness, we are all getting more and…

Large Scale Bluetooth Mesh Testing

Reliability and latency are the key parameters to be optimized to achieve a seamless…

Top 10 Auracast™ Resources

It’s been almost a year since the Bluetooth Special Interest Group (SIG) released Auracast™…

Features and Benefits of Bluetooth Mesh 1.1 for Wireless Mesh Networking

Commercial and industrial applications like lighting require large-scale, low-power device networks where thousands of…

Bluetooth ESL – The Global Standard for the Electronic Shelf Label MarketBluetooth ESL – 電子棚札市場のためのグローバル規格

Electronic shelf label (ESL) systems have historically relied on proprietary protocols for wireless communication,…

The Bluetooth® Low Energy Primer

Are you new to Bluetooth Low Energy? Learn about its constituent parts, features, and how it works.

Bluetooth® Technology for Linux Developers

Learn how to use the interprocess communication system D-Bus and the BlueZ APIs to create Bluetooth applications for Linux computers.

Designing and Developing Bluetooth® Internet Gateways

Learn about Bluetooth internet gateways, how to make them secure and scalable, and design and implement your own working prototype gateway and web application for use with either Bluetooth LE Peripherals or with Bluetooth mesh networks.

 Get Help